管理操作系統 的英文怎麼說

中文拼音 [guǎncāozuòtǒng]
管理操作系統 英文
management operating system; supervisor operation system
  • : Ⅰ名詞1 (管子) pipe; tube 2 (吹奏的樂器) wind musical instrument 3 (形狀似管的電器件) valve;...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • : Ⅰ動詞1 (抓在手裡; 拿; 掌握) hold; grasp 2 (做; 從事) act; do; operate 3 (用某種語言、方言說...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 管理 : manage; run; administer; supervise; rule; administration; management; regulation
  • 操作 : 1 (按照一定的程序和技術要求進行活動) operate; manipulate; handle 2 (所進行的若干連續生產活動的...
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代為一種先進易用的防火墻技術的原,闡述了linux網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工流程。接著敘述了本透明代服務器的總體設計方案,將分為以下幾個部分:透明通道建立、代服務實現、 gui配置程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關,列出了主要數據結構和實現流程。
  2. Multithreading and message drive mechanism is applied to simulate the intercurrent and schedule of the multitask in power distribution system, which builds the foundation of the development based on real - time operation of the project. at the same time, the software deals with the real - time data by the means of memory database and uses the thread security class to maintain the data ' s integrity

    利用windows的消息驅動和多線程機制模擬了配電中多任務的並發和調度過程,為課題在嵌入式實時下的開展打下了一定的基礎;同時,對中大量實時數據則採用內存數據庫方式,並利用線程安全類來保證讀取數據的完整性。
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定員的權力和責任,包括物安全、配置、帳戶設置及使用權限、口令、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻、審計和恢復、安全、數據庫安全、計算機病毒防護和抗抵賴協議等。最後,對事故處和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息安全防範工給出一個整體的解決方案,為其在配置、和應用方面提供了基本的框架。
  4. The chip simulation network laboratory system this paper disguessed is a distribute network simulation system based on lan. the system ' s architecture is a c / s of three lays. the front platform are the chip simulation network system application program terminer ; the middle lay is a dcom server, it ' s duty is to deal with the communication and data transmission between the terminer and then database server, and to execute the logical operation. the application program just connect with the middle lay and get data from it, the connection and operation with database server will be managed by the dcom server. the duty of database server is to access and backup the final data

    具體是由位於網路各個終端的晶元模擬網路實驗應用程序為前臺;中間層為dcom應用程序服務器,負責處前臺應用程序與后臺數據庫的通信和數據傳輸,並執行業務邏輯,前臺應用程序只需要與應用程序服務器建立連接,在中間層數據即可,與后臺數據庫的連接和由應用程序服務器來。后臺數據庫只負責數據的存取。本論文實施的晶元模擬網路實驗模擬了主要的邏輯電路器件, 8088cpu ,存儲器,寄存器,數據總線,地址總線和控制總線,及其它相關晶元。
  5. 2. this software has many kinds function of manage meeting. system software can check the work status of vote machine in spots to make the worker know the status of work in spots

    3 .本控制軟體具有多種會務功能,軟體可以時時檢測表決子機的工狀況,可以方便工人員和時時了解的工狀態
  6. The security mechanism of network database is related with many aspects. though the analysis of architecture and software arrangement, i divide this problem into four layers : network security mechanism, dbms security mechanism, operating system ( server ) security mechanism and application system security mechanism

    從體結構和軟體層次上思考,筆者將其分為網路安全機制、服務器安全機制、數據庫安全機制和應用安全機制四層。在這個層次結構中,每一層都有自己的一套機制,完成自己的任務,實現一定的安全內容。
  7. Based on the theory of software architecture, the hierarchical structure is used for designing the software system because the aocs demands real - time and high reliability. the integrated environment for software cross - development of vxworks is used for simulating the schedule of several multi - tasks, the managing of work mode and the communication among the modules. an approach of software architecture for the attitude and orbit control system of satellite is developed in this paper, which is based on a deep study and analysis of modern software techniques

    本文運用軟體體結構的論,通過對多種軟體體結構的分析比較,針對衛星姿軌控實時、高可靠、復雜等特點,採用層次結構方案進行了體結構設計,並運用實時vxworks的集成開發環境,完成了姿軌控多任務調度、工模式和應用模塊間相互通信的模擬實踐。
  8. After analyzing deeply the present situation of such system in china, author has emphasized the professional use in designing management information system of urban planning and land use file. according to the property, characteristic of the xi " an institute of survey itself and the main technological prop - up of gis functional particularity to determine the system " s developing designed target in detail. needs to research the duty data and integrated management of drawing - piece information, to develop network illustrating inquiring, indexing or operation in view of computer network to design developing user covering for friendship video ability to achieve the planned supervision data and the integrated administration of drawing - piece information, illustrating inquiring by network and handle - case by project network, to form integrated illustrating data storage in view of computer network circumstances, to satisfy the demand of city land use administration, to make the system give free rein to proper role during the user in operation, to make the system give free rein to proper role during the user in operation on the particular duty

    者通過對國內同類建設情況進行了較為詳細的研究后,認為設計規劃用地檔案信息應以強調業務化與實用性為主,根據西安勘測院自身的工性質、特點及主要技術支撐的gis功能特性來具體設定的開發設計目標,研究業務數據和圖件資料的集成模式,發展基於計算機網路的聯網圖文查詢、檢索和,設計開發友好的可視化用戶界面,實現規劃業務數據和圖件資料的集成、聯網圖文查詢以及項目聯網辦案,形成基於計算機網路環境的圖文集成數據庫,滿足城市用地的需要,使能在用戶的具體業務運中發揮其應有的用。
  9. An executable unit managed by an operating system scheduler

    排程程序所的可執行單元。
  10. For developping the third party physical distribution and realizing moden management, jiangmen frigorifico co., ltd. built a tridimensional warehouse, and founded a real - time, high - efficiency, exact, simple - operation, modem warehouse management information system this paper is based on the warehouse management system project of jiangmen frigorifico co., ltd. it studies and discusses the problems and key technologies in the design and implementation of system

    為了發展第三方物流和實現現代化模式,江門冷凍廠有限公司興建了大型的立體倉庫,並建立了一個實時、高效、準確、簡單的現代化立體倉庫信息。本論文以江門冷凍廠有限公司立體倉庫信息開發項目為背景,對設計與實施中需要解決的問題和採用的關鍵技術進行了研究和探討。
  11. Because xen requires a modified operating system, you cannot just take a current linux kernel and run it under the xen hypervisor unless it is ported to the xen architecture

    由於xen需要修改,所以您不能直接讓當前的linux內核在xen程序中運行,除非它已經移植到了xen架構。
  12. Virtual machine monitor, meaning that the operating system is modified in select areas to make calls into the hypervisor, whereas the applications that run on that operating system are unmodified

    (虛擬機監視器, virtual machine monitor ) ,這表示,為了調用程序,要有選擇地修改,然而卻不需要修改上運行的應用程序。
  13. Motif look and feel windows look and feel the solution seemed obvious : an os - independent frame that would let you have all the strengths that a jframe provided - registration with the os window manager, resizing repainting management, maximizing minimizing restore - but still allowed you to set the look and feel of these components

    解決方案看起來很很明顯:一個獨立於的框架,它具有jframe提供的所有功能注冊到os窗口器、調整大小/重繪、最大化/最小化/恢復,同時又可以設置這些組件的外觀。
  14. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計為犯罪取證,出此之外,還有上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  15. Of course, the theories and approaches about the design of database management system and how to integrate our previous research results into the fpax ' s system will be discussed as a main point. part two : in this part, we attempt to introduce the model of the web site so as to build a teleconsultation system based on the browser / server model. via using the java language program, we hope that our telemedicine user can achieve the goal of the teleconsultation just using a www browser

    本研究試圖對應用java技術構築遠程醫療網進行一點初淺的探討,希望藉助java的強大功能,應用jsp / servlet建立一個遠程醫療網站;應用javaapplet實現電子白板、語音傳輸、文字交流等功能;採用jpeg和小波演算法實現圖像的壓縮;實現多種傳輸模式結構;實現病歷數據的后臺;最終建立一個適合不同的遠程醫療會診及教育
  16. There are three ways to manage the selection of an operating system

    有三種方法來管理操作系統的選擇:
  17. Vmware can host an operating system within a particular session, exercise an installation, then roll back all changes to their initial state

    Vmware可以在特定的會話中管理操作系統、進行安裝,然後將所有更改回滾到它們的初始狀態。
  18. With it, you can administer many details of the operating system without ever having to shut down and reboot the machine, which is a boon for those who need to keep their systems as available as possible

    使用/ proc ,您再也不用關閉並重新引導機器來管理操作系統的許多細節問題,這對那些要求的可用性盡可能高的員來說非常有用。
  19. Notifies a host that managed code is about to execute instructions that depend on the identity of the current physical operating system thread

    通知宿主託代碼將要執行依賴于當前物線程的標識的指令。
  20. Notifies a host that managed code has finished executing instructions that depend on the identity of the current physical operating system thread

    通知宿主託代碼已執行完依賴于當前物線程的標識的指令。
分享友人